You are on page 1of 112

Networking 2019

Introduction
In this report we have written and analyzed about what a network is along with its types. We have
also written about networking protocols

1 Meghant Dangol (HND / First Semester)


Networking 2019

Network
A network or computer network is simply collection of interconnected computers. It is also known
as group of two or more computers that can communicate with each other. Computer network is
one of the major and essential component which plays a vital role in evolution of computer system.
It allows users to share data, information and resources with each other from any place if they are
connected with each other. They are connected with each other using either wired media such as
optic cables, twisted pair cables, unshielded twisted pair cables or wirelessly.

Based on the area covered there are mainly three types of computer network.

1. Local Area Network (LAN)


2. Metropolitan Area Network (MAN)
3. Wide Area Network (WAN)

1. Local Area Network (LAN)


A Local Area Network (LAN) is a computer network that connects computers within a small or
limited area. LAN is limited to a single room, building or group of buildings as its network size
ranges to a few kilometers. LANs are most often used in schools or colleges, small organization,
public network or personal network. Ethernet cables and WI-FI are used to connect computers in
LAN. LANs are generally used for hardware sharing. On a small LAN, modem provides an
internet connection, a router connects the computers and provides connection to those computers,
and a WI-FI access point is used to wirelessly connect in the LAN.

2. Metropolitan Area Network (MAN)


A Metropolitan Area Network (MAN) is a computer network that connects computer within a city
or group of cities as its network size ranges from 5 to 50km. MAN is also known as collection of
LANs. MANs are larger than LANs but are smaller than WANs. MANs are efficient and provide
fast communication through high speed carriers such as optic fibers. MANs are used for
communication between towns or cities. MANs are used by cable TV networks, telephone
networks and banks to communicate with other branches. Generally MAN is owned by a user
group or network provider who sells services to users.

3. Wide Area Network (WAN)


A Wide Area Network (WAN) is a computer network that connects computer from wide range
covering cities, countries or even entire globe. WAN is the collection of MANs and LANs. WANs
are the largest connection of computer networks and have large capacity connecting large number

2 Meghant Dangol (HND / First Semester)


Networking 2019

of computers over a large area. WANs are used to provide communications between countries or
cities. Internet is one of the best example of WAN. WANs are used by telephones network,
network providers, cable systems or satellites. WANs are also used to share data all over the world.

Types of Networks
There are various types of networks they are based on how server and clients are connected with
each other. Types of network may vary from one network to another. Some of the most commonly
used network types are:

1. Peer to Peer Network


In the peer to peer (P2P) computer network model we simply use the same workgroup for all the
computers and a unique name for each computer in a computer network. In this type of computer
network all the computers serve as servers and clients. So there is no master or controller or central
server in this computer network and computers join hands to share files, printers and Internet
access. This type of network is suitable for small networks having 10 or less computers connected
with each other. Bit torrent is one of the example of peer to peer networking model.

Figure 1: Peer to Peer Network

3 Meghant Dangol (HND / First Semester)


Networking 2019

Benefits of Peer to Peer Network

This type of network is easy to setup and maintain as all the computer manages itself. In this type
of network no cost for setting up server and maintaining it is required and it is less expensive. All
computers work individually so one computer dose not interrupt other computer’s operation. In
P2P network all computers act as server and client so there is no need of dedicated server.

Constraints of Peer to Peer Network

In this type of network due to absence of centralized server it is difficult to backup and manage
data. Security is weak as the security of all computers is dependent in individual computes. Any
computer can be accessed any time. Users have to use separate passwords for separate computers.

2. Client-Server Network
In client-server network model there is a powerful computer known as server which provides
network services to all other user computers also known as clients to perform user’s tasks. In this
type of network there exists a central controller called server which is the main computer that
controls the network resources and provides services to all other computers in the network. Clients
requests a services then server provides those services to client in client server model. A server
manages security and resources which may include files, hardware or software and all the clients
communicate with each other through a centralized server. If client A wants to send data to client
B it first needs to send request to server to seek permission the server then grants the permission
and data can be transmitted from client A to client B. Most LANs are based on client server
network model.

Figure 2: Client-Server Network

4 Meghant Dangol (HND / First Semester)


Networking 2019

Benefits of Client-Server Network

Backup and management of data is possible and easy due to centralized server. Security is better in
client-server network as all the shared resources are centrally administered. Dedicated servers
improves performance of whole system. Dedicated servers improves speed of resource sharing.

Constraints of Client-Server Network

It requires servers with large memory and secondary storage. So the cost is high. It requires
dedicated network administration. Cost of network operating system and networking devices is
also high.

3. Cloud Network
Cloud network is the accessing of storage, information or data on online level. In cloud network
resources are available on demand by the service provider who hosts them on cloud platform. In
cloud network users can access client computers but they cannot access server computers because
the server computer is kept with cloud server provider. If user needs access data from the cloud
server then user first sends request through internet and gets response from cloud server.

Figure 3: Cloud Network

Benefit of Cloud Network

This type of network does not require servers so size of data centers can be reduced. In this type of
network data can be accessed from anywhere at any time. Hardware cost can be reduced. This

5 Meghant Dangol (HND / First Semester)


Networking 2019

network provides high storage capacity for low cost. User do not need network administrators to
maintain server.

Constraints of Cloud Network

Since all cloud service providers are different cloud server may offer limited services. A cloud
server is not backed up. Cloud server requires constant internet connection. If error occurs in cloud
server then users will not be able to access the server until it is fixed by cloud service providers.
For connecting cloud servers users need to have a internet access.

4. Centralized Network
Centralized network is a type of network where all the computers are connected to a central server
where all information is stored. In centralized network all clients are connected to a central server
computer and it needs to request the central server computer for accessing its information. If the
server computer responds to the request of client the client can access information. Public and
instant messaging platform use centralized server.

Figure 4: Centralized Network

Benefits of Centralized Network

It is easier to manage data in centralized network as there is only one server. Data can be secured
as the security of server is high. Cost of a centralized server is cheaper and it is easy to configure.

Constraints of Centralized Network

In centralized network all data are in same server so loss of data is possible. Centralized networks
require high skilled IT officers and administrators. This type of network is expensive.

6 Meghant Dangol (HND / First Semester)


Networking 2019

5. Cluster Network
Cluster network is a group of interconnected computers which works together as a single system.
In this system each node is set to perform different task at a given time which is controlled and
scheduled by a software. The nodes are connected through LANs and each node is operating its
own instance of Operating System.

Figure 5: Cluster Network

Benefits of Cluster Network

In cluster network same data are backed up in different servers so data recovery can be obtained.
Data is stored in different servers so this type of network has high processing capacity.

Constraints of Cluster Network

This type of network requires various hardware, software and skilled professionals to operate so
cost is high. This type of network is hard to monitor and maintain.

6. Virtual Network
Virtual network are the network mad in a virtual environment. This network is made within a
operating system using virtual machines. While physical networking connects computers through
cabling and other hardware, virtual networking extends these capabilities by using software
management to connect computers and servers over the Internet. Virtual networks do not require
physical connection like cabling.

7 Meghant Dangol (HND / First Semester)


Networking 2019

Benefits of Virtual Network

Virtual network are cheaper than other networks as they do not require physical connection and
networking devices. Virtual networks offers flexible routing methods. Virtual networks improves
network traffics.

Constraints of Virtual Network

Even if virtual network is cheaper it requires high performing computers. Virtual networks are less
efficient. Performance of host computers is hindered while running many virtual computers.

Networking Standard
Networking standards define how data is transmitted in a network. Based on how data is
transmitted over a network there are different networking standards. Here are three main
networking standards:

1. Open System Interconnection (OSI) Model


Open System Interconnection (OSI) model is a networking model that describes how data and
information from a software application in one computer is transmitted through a physical medium
to the software application in another computer. OSI model was developed by International
Organization for Standardization (ISO) in 1984. It consists of seven layers and each layer performs
a specific network function. OSI model divides the whole task into seven smaller and manageable
task and each layer has particular task. (https://www.javatpoint.com/osi-model, n.d.) The seven
layers of OSI model are:

I. Application Layer
II. Presentation Layer
III. Session Layer
IV. Transport Layer
V. Network Layer
VI. Data Link Layer
VII. Physical Layer

8 Meghant Dangol (HND / First Semester)


Networking 2019

Figure 6: OSI Model

I. Application Layer
Application layer is used as bridge for user and applications to access network services. Network
transparency and resource allocation are handled by application layer. This layer provides function
to users. The main function of this layer is to handle files stored in remote computers and give user
access to those files.

II. Presentation Layer


Presentation layer checks the syntax and semantics of information passed between two computers
and acts as translator for a network. It converts data from one format to another format. Due to
these reasons it is also known as syntax layer. This layers translates data to a common format
known for both sender and receiver, encrypts those data and compresses it.

III. Session Layer


Session layer is used to establish, synchronize and maintain the interaction between
communication devices. This layer creates bridge between two processes which allows
communication between them and it also adds checkpoints while data is being transmitted and if
error occurs while transmitting data this layer sends data from that checkpoint which helps in
recovery of data.

9 Meghant Dangol (HND / First Semester)


Networking 2019

IV. Transport Layer


Transport layer ensures that the messages and data are transmitted in order in which they were sent
and there is no duplicate data. Its main function is to ensure that data is sent completely. It receives
data and converts it into smaller units known as segments. It uses Transmission Control Protocol
and Datagram Protocol. This layer adds header which contains addresses and divides the message
received from upper layers into multiple segments and assigns a sequence of numbers and
reassembles those segments based on the sequence numbers. This layer also ensures that data is
transmitted without any error.

V. Network Layer

This layer manages device addressing and tracks the location of all the devices on the network. It
also determines the ideal path for data to move from source to the destination based on the
condition of network, priority of service, and other various factors. This layer provides connection
between different devices and adds source and destination addresses to header and determines the
best path from source to destination.

VI. Data-Link Layer


Data-Link Layer is responsible for the error-free transfer of data. This layer defines the format of
the data on the network and provides a reliable communication between the devices. This layer is
responsible for the unique identification of each device that are connected on a local network. This
layer adds destination address to the header.

VII. Physical layer

Physical layer transmits individual bits from sender to receiver. This layer establishes, maintains
and deactivates the physical connection. It is the lowest layer of OSI Model. This layer defines
how devices are physically connected, defines transmission mode and defines the topology of that
network.

Benefits of OSI Model

OSI model acts as guideline in designing network model. Changes in one layer of OSI model does
not have any impact on any other layer. This model supports both wired and wireless service.

10 Meghant Dangol (HND / First Semester)


Networking 2019

Constraints of OSI Model

OSI model is a theoretical model and is very complex as it has many layers. Some layers of OSI
model have very less function.

2. TCP/IP Model

TCP/IP model was developed after OSI model and is compressed version of OSI model. TCP/IP
model has four layers

I. Process/Application Layer
II. Host-to-Host/Transport Layer
III. Internet Layer
IV. Network Access/Link Layer

Figure 7: TCP/IP Model

I. Application layer

It is the topmost layer of TCP/IP model. Application layer allows user to interact with the
application. It forwards data to transport layer in order to communicate with other layers. This
layer allows user to access various email services, remote log on etc. This layer combines the
functions of interfaces with various applications, data encoding and data translation for the users to
communicate with networking system.

II. Transport Layer

11 Meghant Dangol (HND / First Semester)


Networking 2019

This layer is responsible for the reliability, flow control, and correction of data which is being sent
over the network. This layer has two protocols Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP). Both the protocols are used for sending data over a network. This layer
also adds headers to data which is being sent. This layer divides data into various parts and
arranges sequence on which those parts are being sent.

III. Internet Layer

The function of internet layer is to send the packets from any network, and they arrive at the
destination irrespective of the route they take. This layer holds TCP/IP model together. This layer
uses Internet Protocol. This layer determines the best path for packets to travel. This layer
corresponds to network layer of OSI model.

IV. Network Access Layer

Network Access layer is the lowest layer of the TCP/IP model and is combined with Physical layer
and Data Link layer defined in the OSI model. This layer defines how the data should be sent
physically through the network and is responsible for the transmission of the data between two or
more devices on the same network. This layer uses physical address to identify host computer to
deliver data.

Benefits of TCP/IP Model

TCP/IP model can easily be used in practical networking. It allows communication between
multiple networks. TCP/IP model provides IP to all hosts making them identifiable on the network.

Constraints of TCP/IP Model

TCP/IP model is not optimizable in small network. This model is complicated model to set up and
manage. TCP/IP model has no clear separation from its services, interfaces, and protocols.

3. IEEE 802 Standard


IEEE 802 standard is a network standard which defines the standard and protocols for wired local
area networks, metropolitan area networks, wide area networks and wireless networks. It also
defines the characteristics, operating procedures, protocols and services for networks that carry

12 Meghant Dangol (HND / First Semester)


Networking 2019

variable sized packets and specifies the development and handling of compatible devices and
equipment.

Comparison between OSI and TCP/IP Model


Similarities between OSI and TCP/IP Model

• Both OSI and TCP/IP models are the logical models.

• Both models define standards for networking.


• Both models provides a framework which can be used for creating and implementing
networking standards and devices.
• Both models divides the communication process in various different layers.
• In both models, a single layer defines a particular functionality and sets the standard for that
functionality only.
• Both models allow a manufacturer to make devices and network components that can
coexist and work with the devices and components made by other manufacturers.
• Both models simplify troubleshooting process by dividing complex functions into simpler
components.

Differences between OSI and TCP/IP Model


Table 1: Differences between OSI and TCP/IP Model
OSI TCP/IP
1. It has seven layers. 1. It has four layers.
2. It is no longer used. 2. It is still being used.
3. To define the functionality of upper layers, 3. To define functionality of upper layers, it
it uses three separate layers. uses only one layer.

4. It uses two separate layers to define 4. It uses only one layer to define
functionality of lower layers. functionality of lower layers

5. It well documented and explains standards 5. It is not well documented and briefly
and protocols in more details explains standards and protocols.

Network Topology
Topology is the structure of the network of how all the components are interconnected to each
other. Topology of a network defines how data is transmitted in that network. There are five types
of network topologies they are:

13 Meghant Dangol (HND / First Semester)


Networking 2019

1. Bus topology
2. Ring topology
3. Star topology
4. Mesh topology
5. Tree topology
6. Hybrid topology

1. Bus topology
In bus topology all the stations are connected through a single cable also known as backbone cable.
In this topology each node is either connected to the backbone cable by drop cable or is directly
connected to the backbone cable. In bus topology when a node wants to send a message over the
network, it puts a message over the network. All the stations available in the network will receive
the message whether it has been addressed or not. The configuration of bus topology is simpler
compared to other topology.

Figure 8: Bus Topology

Impact of Bus topology

Bus topology is cheap and can be easily configured. Hardware components for bus topology are
easily available. Failure in one node does not affect other nodes in bus topology. Bus topology is
simpler but still requires lot of cabling. Bus topology requires special test equipment to determine
cable faults. If any fault occurs on cable then all communication for nodes will disrupt. In bus
topology adding new device will slow the network.

14 Meghant Dangol (HND / First Semester)


Networking 2019

2. Ring Topology
In ring topology all the nodes are connected end to ends and node that receives message will
retransmit it to next node. In ring topology data flows only in one direction. Data flows in a loop
and can only flow in clockwise or anticlockwise direction. Nodes use tokens in order to send data
and token also flows in only one direction.

Figure 9: Ring Topology

Impact of Ring topology

In ring topology faulty devices can be removed without bringing the network down. It uses twisted
pair cables which are easily available so installation cost is low. It is more reliable because it does
not depend on single host computer. Like bus topology it uses special test equipment to determine
cable faults. Fault on cable would disrupt whole network. Adding new devices would slow the
network.

3. Star topology
In star topology all the nodes are centrally connected to a single hub or switch. The central
computer is known as server and the other computers are known as clients. In this topology co-
axial cables or RJ-45 cables are used.

15 Meghant Dangol (HND / First Semester)


Networking 2019

Figure 10: Star Topology

Impact of Star Topology

Complex network control features can easily be attained in star topology. Troubleshooting in
network is quite easier compared to bus topology. Failure of cable will not interrupt the whole
network as nodes are connected to central hub. Star topology is easily expandable as new nodes
can be added in open hub ports. Star topology uses coaxial cable so it is cost efficient. Failure in
central computer would interrupt whole network.

4. Mesh Topology
In mesh topology computers are interconnected with each other through various connections and
there are multiple paths from one computer to another. It does not contain switch, hub or a central
computer. This topology is generally used for wireless communication. Internet is the best example
of mesh topology.

Figure 11: Mesh Topology

16 Meghant Dangol (HND / First Semester)


Networking 2019

Impact of Mesh Topology

Mesh topology is reliable and any link breakdown will not affect communication of connected
computers. In mesh topology communication is very fast between nodes. In mesh topology adding
new devices will not disrupt the network. Mesh topology is expensive than other topologies.
Networks in mesh topology are large and hard to maintain.

5. Tree Topology
In tree topology all the computers are connected in hierarchical way. It is the combination of bus
and star topology. There is only one path for data transmission hence it forms parent-child
hierarchy.

Figure 12: Tree Topology

Impact of Tree Topology

Signals can be sent to long distance without being reduced. Adding new devices to existing
network can be easily attained. In tree topology whole network is divided into segments so it can
be easily maintained. In tree topology error detection and maintenance can be done easily. Tree
topology is expensive as it requires lot of cables for connection. In tree topology if new devices are
added reconfiguration is difficult.

6. Hybrid Topology
Hybrid topology is a topology with combination of multiple topologies. In hybrid topology the
topologies are combined as per requirement of organization. This topology can be useful when a
organization needs multiple topologies for same network and can afford it. Hybrid topology
inherits both the advantages and disadvantages of topologies it has included.

17 Meghant Dangol (HND / First Semester)


Networking 2019

Figure 13: Hybrid Topology

Impact of Hybrid Topology

This topology is one of the most effective topology. Hybrid topology is highly reliable. Hybrid
topology can inherit benefits of multiple topologies. Hybrid topology is highly flexible. This
topology makes network complex.

Comparison between topologies


Topology Complexity Expansion Reliability Cost Security
Bus Simplest To add a new If there is It is cheap Not secure
topology node you need error in one
to disconnect
all nodes node all
nodes go
down
Ring Simple To add a new If there
is Expensive due Not secure
topology used node cable error in one to high cable
for LANs between
two node all cost
nodes must be nodes go
broken
down
Tree Complex Easy to add Even if one Expensive due Secure
topology new nodes node goes to high cable
down network cost
still works

18 Meghant Dangol (HND / First Semester)


Networking 2019

Star Simple and Easy to add When there is Expensive Secure


used in LANs new node error in one than Bus but
node network cheaper than
is unaffected other
topologies

Mesh Complex Easy to add When there is Expensive Secure


new node error in one
node network
is unaffected

Protocols Used in Network System


Protocols are the set of rules that must be followed in order to communicate from one computer to
another in a network. Each protocol used in a network system has its own purpose and meaning.
For user to be able to communicate to each other the following protocols must be followed:

1. Internet Protocol effectiveness purpose


2. User Datagram Protocol
3. File Transfer Protocol
4. Hypertext Transfer Protocol
5. Simple Mail Transfer Protocol
6. Domain Name System
7. Dynamic Host Configuration Protocol

1. Internet Protocol (IP)


Internet Protocol is a rule which defines how data is sent on a network. The data sent over internet
contains the sender’s and receiver’s internet address also known as IP Address. The data is then
transmitted from sender to receiver on Internet via IP Addresses. There are two versions of IP used
currently IPv4 and IPv6. IPv4 is older version of Internet protocol and the world is slowly shifting
towards using IPv6.

Effectiveness of Internet Protocol

Internet Protocol helps in securely connect user to Internet. IP also helps in securely sending data
over the internet.

19 Meghant Dangol (HND / First Semester)


Networking 2019

2. User Datagram Protocol


User Datagram Protocol (UDP) is a datagram oriented transport layer protocol used for enabling
and establishing low dormancy connection between applications and internet. It enables process to
process communication and send messages. UDP is fast, simple and efficient and is used in
broadcast and multicast type network.

Effectiveness of User Datagram Protocol

User Datagram Protocol helps in sending messages quickly in the internet. UDP is used when
messages are needed to be sent fast and when quality does not matter.

3. File Transfer Protocol


File Transfer Protocol (FTP) is an application layer protocol used to transfer files between
computers generally client and servers on a network. FTP is generally used for downloading files
stored in servers.

Effectiveness of File Transfer Protocol

File Transfer Protocol is helps in storing and downloading files stored in server.

4. Hypertext Transfer Protocol


Hypertext Transfer Protocol (HTTP) is an application layer protocol used to retrieve data from World
Wide Web (WWW). It is set of rules that allows users to exchange information found on World Wide
Web. Hypertext Transfer Protocol is used to transfer data into hypertext.

Effectiveness of Hypertext Transfer Protocol

Hypertext Transfer Protocol is used in creating webpages.

5. Simple Mail Transfer Protocol


Simple Mail Transfer Protocol (SMTP) is an application layer protocol which is used to transfer
emails from one computer to another. This protocol is used for forwarding mail messages from one
mail server to another.

Effectiveness of Simple Mail Transfer Protocol

Simple Mail Transfer Protocol helps in sending mails throughout internet securely. SMTP also
user to quickly send mails.

20 Meghant Dangol (HND / First Semester)


Networking 2019

6. Domain Name System/Server (DNS)


DNS are used to convert name of domains into IP addresses and IP addresses to name of domains.
DNS makes it easy for users to remember the domain name as IP addresses are hard to remember
and the domain can easily be accessed by using name of that domain.

Effectiveness of Domain Name System

DNS helps in accessing domains with their names rather than their IP addresses and makes domain
user friendly.

7. Dynamic Host Configuration Protocol (DHCP)


Dynamic Host Control Protocol automatically provides IP addresses to all the host connected in a
particular network without needing to statically type IP address. Along with IP address this
protocol also provides address of DNS server to computers connected in a network.

Effectiveness of Dynamic Host Configuration Protocol

DHCP automatically provides IP addresses which makes it easier for user to not remember IP
addresses. DHCP helps in reducing IP redundancy as it provides unique IP to all hosts.

Networking Devices
There are various devices used in networking some of them may be used in connecting computers
using wires and some may be used in connecting computers wirelessly, some may be used in
strengthening network signals. Some of the most commonly used networking devices are:

1. Hub
2. Switch
3. Multilayer Switch
4. Repeater 5. Bridge
6. Gateway
7. Access Point
8. Modem
9. Router
10. Host-Based Intrusion Detection System (HIDS)
11. Content Filter
12. Load Balancer

21 Meghant Dangol (HND / First Semester)


Networking 2019

13. Packet Shaper


14. VPN concentrator

1. Hub
Hub is a networking device used for connecting two or more computers. Hubs have multiple ports
where computers are connected using wires. When data arrives from a port to hub it sends it to all
other ports. Ports in hub may vary generally 4-5 port hub are used in home whereas 8-16 port hub
are used in small offices varying on computers used. It operates on physical layer of OSI model.

2. Switch
Switch is advance version of hub it is also used for connecting two or more computers. Unlike hub
switch filter forwards the data so that data is only received by the host intending to receive it.
Switch determines the receiver of data by at Media Access Control (MAC) address. It operates on
Data-link layer of OSI model.

3. Multilayer Switch
Multilayer switch is a networking device which operate on all layers of OSI model unlike
traditional switch which operates on Data-link layer. It routes and switches decision based on
MAC addresses on data link frame, IP addresses on header of network layer and port number on
header of transport layer.

Multilayer Switch uses ASIC circuit for routing.

4. Repeaters
Repeater is a networking device which receives a signal and emits that signal at a higher level. A
receiver has two ports and its main function is to amplify the signal it receives before it corrupted
or weak. It operates on Physical Layer of OSI model.

5. Bridge
Bridge is a networking device used in connecting two subnetworks of same network. Bridge is also
used in filtering network segments by examining MAC address of destination. Bridge has two
ports one input port and one output port. It operates on Data-link layer of OSI model.

22 Meghant Dangol (HND / First Semester)


Networking 2019

6. Gateway
Gateway is a networking device used in connecting two networks which may work on different
networking models. The main function of gateway is to take message from one network interpret it
and send it to another network. It works on Network layer of OSI model.

7. Access Point
Access Point is a networking device used in wireless local area networks which is used for sending
and receiving signals. Access Point serves as interconnection between wired and wireless
networks. One access point may have multiple user and when the user moves from one place to
another it connects on nearest access point.

8. Modem
Modem (Modulator-Demodulator) is a networking device used for translating digital signals into
analog signals and vice versa. It allows computers to send and receive data along telephone signals
or satellite connection. Modulator converts digital signals to analog signals and demodulator
converts analog signal to digital signals

9. Router
Router is a networking device which can receive, analyze and forward data packets from one node
to another by processing the routing information on that packet. Routers also perform as Network
Address Translator (NAT) which is used for converting private IP addresses to public IP addresses
as it connects local area network to wide area network. It works on Network layer of OSI model.

10. Host Based Intrusion Detection System


“A host-based intrusion detection system (HIDS) is a system that monitors a computer system on
which it is installed to detect an intrusion and/or misuse, and responds by logging the activity and
notifying the designated authority. A HIDS can be thought of as an agent that monitors and
analyzes whether anything or anyone, whether internal or external, has circumvented the system’s
security policy”. (What is Host-Based Intrusion Detection System (HIDS)? - Definition from
Techopedia, n.d.)

11. Content Filter


Content filter is the use of program to prevent the access of harmful items. Those harmful items
can be executable files, emails or websites. Content filter can be used either as a software or as a

23 Meghant Dangol (HND / First Semester)


Networking 2019

hardware. Content filters are used by big corporations as firewalls or by home users to filter the
content their children have access to by a computer.

12. Load Balancer


A load balancer improves the distribution of workloads among multiple computing resources. It is
used to optimize network efficiency and capacity. If one server on a network stops working then
load balancer automatically transfers the workload to another server without having heavy impact
on client computers. It can be acquired through hardware or software.

13. Packet Shaper


Packet shaper is a networking device which sits between private network and public network
where all incoming and outgoing traffic pass and its main function is to classify the traffic which
passes through it. Packet Shaper prioritizes the traffic based on the rule user sets.

14. VPN Concentrator


VPN concentrator is a networking device which is used to manage VPNs over a network. Its main
function is to establish secure VPN connection, encrypting connection, establishing VPN tunnels
and authenticating users.

Server
A server is a software or hardware device that accepts and responds to requests made over a
network. The device that makes the request, and receives a response from the server, is called a
client. “On the Internet, the term "server" commonly refers to the computer system which receives
a request for a web document, and sends the requested information to the client” (What is a
Server ?, n.d.). Based on what a server does there are various types of server and some of them are:

1. Web Server
2. File Server
3. Database Server
4. Print Server
5. Virtual Server
6. Terminal Server
7. Combination Server

24 Meghant Dangol (HND / First Semester)


Networking 2019

1. Web Server
A web server is a server which stores one or many websites and satisfy the request provided by
clients. This server uses Hypertext Transfer Protocol (HTTP) to respond to client requests. “It is
accessed through the domain names of websites and ensures the delivery of the site's content to the
requesting user. As hardware, a Web server is a computer that holds web server software and other
files related to a website, such as HTML documents, images and JavaScript files. Web server
hardware is connected to the internet and allows data to be exchanged with other connected
devices” (Rouse, n.d.).

2. File Server
A file server is a server which is used for storing files in a network. It provides its large storage
capacity to the clients. “File servers therefore offer users a central storage place for files on internal
data media, which is accessible to all authorized clients. Here, the server administrator defines
strict rules regarding which users have which access rights: For instance, the configuration or file
authorizations of the respective file system enable the admin to set which files can be seen and
opened by a certain user or user group, and whether data can only be viewed or also added, edited,
or deleted.” (File server, 2019)

3. Database Server
A database server is a server used to store databases. It can be accessed while a user is trying to log
in or log out of the application which uses database. Database server may hold database for one or
many applications. This server also provides database services. This servers can also be accessed
through backend by using query languages.

4. Print Server
A print server is a server used for managing printers and printing tasks. This server connects all
printers of an organization to client computers. When a client sends printing request the print
server directs this request to printer. This server allows user to handle printing jobs without having
to move files from one computer to the computer printer is connected to.

5. Virtual Server
A virtual server is a server that shares hardware with other operating systems. This server is cost
effective. A virtual server mimics the functions of a server and many virtual server may run on one
dedicated server. Virtual servers may be obtained by using software such as VMware, Virtual Box
etc.

25 Meghant Dangol (HND / First Semester)


Networking 2019

6. Terminal Server
“A terminal server is a server that enables one or more terminals to connect to a local area network
(LAN) or the Internet without the need for each terminal to have a network interface card (NIC) or
modem. Terminals can be PCs, printers, IBM 3270 emulators or other devices with a RS-232 /
RS423 serial port interface. Terminal servers can often support connections of up to 128 terminal
devices “(Beal, n.d.). Terminal servers are used to connect client computers to internet without
needing NIC.

7. Combination Server
A combination server is a server that fulfills multiple requirements. This server can provide
different services such as file and print, web, database, application etc. A combination server can
be cost effective and can be used by small organizations as this server can provides facilities of all
other servers in a single server.

Interdependence of Hardware and Software


A computer system consists of two major parts hardware and software. Hardware is a physical part
of computer system and they can be felt and touched. Software is a part of computer system which
cannot be felt but can be seen. A computer is incomplete without the combination of hardware and
software. If hardware is skin of computer then software is the muscle of computer system. Without
hardware software cannot be accessed and without software hardware cannot work. Software is
essential in operating hardware of computer system.

Hardware Requirements
Server requires following hardware requirements:

Processor 3 GHz
RAM 24 GB
Hard Drive 4 TB
Graphics Coprocessor None

Processor Count 1
Hard Drive Interface Serial ATA
Connectivity Serial
Network 1 x 1GbE ports standard
Power Single Power Supply

26 Meghant Dangol (HND / First Semester)


Networking 2019

Server Software
The software used by servers to operate the functions is called server software. It is essential to
achieve all functions of a server. Sever software also essential in operating networking devices.
“Server software is a type of software that is designed to be used, operated and managed on a
computing server. It provides and facilitates the harnessing of underlying server computing power
for use with an array of high-end computing services and functions” (What is Server Software? -
Definition from Techopedia, n.d.). Some examples of server software are Apache, Tomcat,
OracleDB etc.

Client Software
The software used by clients or general for various purpose such as text editing, modelling,
programming, designing is called client software. These software are used in client computers
without having heavy impact on server. Client software may or may not depend on server
software. Some examples of client software are Microsoft Office, Visual Studio, MS SQL
Management studio etc.

Server Operating System


The operating system used by servers is known as server operating system. These operating
systems are specifically designed for servers and is a software on which other software run. These
operating system helps to facilitate typical server roles such as web server, mail server, file server,
database server, application server and print server. These operating system require high skills to
operate. Some examples of server operating system are Windows Server 2012, Linux, and Red Hat
Enterprise Linus etc.

Client Operating System


The operating system used by clients is known as client operating system. They are general
purpose operating systems that can be used in our day to day life. These operating system are easy
to use and set up, they are also efficient and can run general purpose software. These operating
system do not require high skill to operate. Some examples of client operating system are
Windows 7, Ubuntu, mac OS etc.

Software Requirements
Software Client Server
Operating System Windows 7 Windows Server 2012
Firewall Juniper Tinywall

27 Meghant Dangol (HND / First Semester)


Networking 2019

Firewall
“A firewall is a network security device, either hardware or software-based, which monitors all
incoming and outgoing traffic and based on a defined set of security rules it accepts, rejects or
drops that specific traffic” (Introduction of Firewall in Computer Network - GeeksforGeeks, n.d.).
A firewall is a barrier between private network and public network. In a LAN private network is
secured whereas public network is unsecured and firewall block the specific unsecured traffic.
Generally there are two types of firewall they are:

1. Host-based firewall
2. Network-based firewall

1. Host-based firewall

Host-based firewall is a firewall which is installed on each client computer which controls each
incoming and outgoing packet. It is a software which comes as a part of the operating system.
Hostbased firewalls are needed because network firewalls cannot provide protection inside a
trusted network. Host firewall protects each host from attacks and unauthorized access.

2. Network-Based firewall

Network based firewall filters all incoming and outgoing traffic across the network and protects the
internal network by filtering the traffic using rules defined on the firewall. A Network firewall
might have two or more network interface cards (NICs). A network-based firewall is usually a
dedicated system with proprietary software installed.

Range of Servers
Various server have various features and some server may have the best feature for the selection of
best server here is a list of servers:

1. Lenovo ThinkSystem ST50


Lenovo ThinkSystem ST50 is one of the best servers. It is compact and cost efficient. This server
is flexible and durable. This server has a large power storage capacity.

Price:

28 Meghant Dangol (HND / First Semester)


Networking 2019

Figure 14: Lenovo ThinkSystem ST50 This


server has the following specifications:
Processor 3.4 GHz Intel Xeon MP
RAM 32 GB
Hard Drive 6 TB
Graphics Coprocessor None
Processor Brand Intel
Processor Count 1
Computer Memory Type DIMM
Hard Drive Interface Serial ATA
Connectivity Serial
Network 1 x 1GbE ports standard
Power Single Power Supply
2. Dell PowerEdge T640
This server is one of the newest server and is a little expensive than other servers but this server is
faster than other server and has many features which other server lack. This server is durable and
has a large power storage capacity.

Price:

29 Meghant Dangol (HND / First Semester)


Networking 2019

Figure 15: Dell PowerEdge T640 This


server has following specifications:
Processor 2.1 GHz Intel Xeon MP
RAM 256 GB
Hard Drive 3.2 TB
Solid State Drives 3.2TB (4 x 800GB) Enterprise SAS
Graphics Coprocessor None
Remote Access iDRAC9 Express
Network Interface Card On-Board Broadcom 5720 Dual Port 1Gb
LOM
Power Redundant Power Supplies

3. Dell PowerEdge T340


This server is a server with a good specification at a reasonable price this server can be easily set
up and configured. This server is flexible for all kind of environment. This server has a large
power storage capacity.

30 Meghant Dangol (HND / First Semester)


Networking 2019

Figure 16: Dell PowerEdge T340 This


server has following specifications:

Processor 3.3 GHz Intel Xeon MP


RAM 32 GB
Hard Drive 16 TB
Processor Brand Intel
Processor Count 1
Dell Remote Access Card iDRAC9 Express
NIC On-Board Broadcom 5720 Dual Port 1Gb LOM
Power Supply Single Cabled Power Supply

Server is the most important part of a network system and a server must be reliable and should
have a good specifications. Among these three servers we would recommend using Dell
PowerEdge T640 on head office because it provides the operating capacity paid for its cost and is a
fast server with latest technology used. We think this server would have less problem and will not
overheat easily so this is the best server for using in head office. This server also has a lot of
features which will be helpful in head office.

As for branch offices we would recommend using Dell PowerEdge T340 as this server is of
reasonable price for the specification it provides and this server is quite fast and reliable for using

31 Meghant Dangol (HND / First Semester)


Networking 2019

in branch offices. This server will be most useful for branch offices where there is less workload
and this server also consumes less power.

Selection of best topology


Network topology is a way in which the nodes in a network are interconnected to each other. There
are five types of network topology. Among those five topologies we have decided that we would
use mesh topology for setting up network at this network at head office as mesh topology is one of
the best topology and is useful in various ways. Mesh topology is one of the widely used topology
in modern day world. Mesh topology is fastest for data transmission and there are many routes for
data transmission so even if one route is blocked data would be transmitted from other routes. If all
routes for data transmission are open then data would be transmitted from fastest route. Mesh
topology is easy to configure and easy to use. Even if a computer is down it will not affect the
network. For mesh topology we can extend network easily and maintain the network easily as well.
Mesh topology is useful for a large network and for head office we need a large network. Mesh
topology does not require more networking devices. If we use mesh topology for head office it will
be easier for network administrator to find error in network and fix it. We can easily separate sub
networks in mesh topology.

Even if mesh topology is expensive and complex while configuring it will have less problems in
future. Even if a problem arises in future it would be easier to maintain and fix that problem. All
clients in mesh topology can work independently even if they are connected to each other. Mesh
topology is most useful for large network. Mesh topology can be most beneficial topology for this
type network.

For branch offices we planned on using star topology. Star topology is useful for maintaining a
small LAN and branch offices will not have many computers. Star topology is not as expensive as
mesh topology and it has some of features of mesh topology as well. In star topology error in one
node will not affect other nodes. Star topology is easy to configure and modify. This topology is
fast with fewer computers and adding or removing new computers is easy. This topology requires
more networking devices. Star topology is best used in small network. The smaller the network is
data transfer rate is faster in star topology. This topology is can be maintained easily. This
topology is also useful while dividing subnets and we can divide sub nets based on switch the
computers are connected to.

32 Meghant Dangol (HND / First Semester)


Networking 2019

Star topology is cheaper and easy to configure than mesh topology so using it in branch offices will
be most effective. Mesh topology may require more networking devices than mesh topology but it
is not a large price to pay compared to the usefulness of star topology. Star topology is most
beneficial for the network in branch offices.

By using Mesh topology in head office and Star topology in branch office our whole network will
be in hybrid topology. In hybrid topology we can utilize the benefits of both mesh and star
topology. This topology becomes most reliable by using mesh and star topology as its base. This
topology will have fast data transmission.

33 Meghant Dangol (HND / First Semester)


Networking 2019

Introduction
Landmark IT Pvt. Ltd has paid us a capital of Rs.200 million to configure their network system.
The head office will be situated in Tilganga, Kathmandu and they will have 20 branch offices
around the country. They will provide different IT related services for different types of
organization like School, Bank, Colleges, INGO, NGO etc. I have been hired as a network/ system
administrator of this company to plan design implement and manage the entire network systems
considering IP addressing, server system, network devices, security devices & other miscellaneous
IT related services. We have to design a network system which meets all the condition presented to
us.

34 Meghant Dangol (HND / First Semester)


Networking 2019

Network Design

35 Meghant Dangol (HND / First Semester)


Networking 2019

Table of IP
Landmark IT Pvt. Ltd Head Office Tilganga, Kathmandu
Server IP Address Subnet Mask
Domain Controller server 192.168.1.2/29 255.255.255.248
DHCP server 192.168.1.3/29 255.255.255.248
DHCP Relay Agent 192.168.1.4/29 255.255.255.248
VPN Server 192.168.1.5/29 255.255.255.248
Landmark IT Pvt. Ltd Branch Office Pokhara
Server IP Address Subnet Mask
CDC server 192.168.2.2/29 255.255.255.248
RODC server 192.168.2.3/29 255.255.255.248
VPN Server 192.168.2.4/29 255.255.255.248

Networking Device in use:


For landmark we have used the following networking devices:

Firewall

We used firewall to monitor incoming and outgoing traffic and defined some security rules which
accepts, rejects and drops traffic. In this network firewall is used while connecting router to the
internet because all the incoming and outgoing traffic will come to router and go from router as
well.

Router

Router is a networking device which routes data and in this network we have used router to route
the connection from ISP to head office. While data comes from ISP firewall monitors the data and
then router routes it to other switches.

Switch

A switch is a networking device used for connecting computers in a network. In this network we
have used switches to connect server and clients computers. In head offices we have not used
many switches because we have used mesh topology but in branch offices we have used multiple
switches for connecting computers.

36 Meghant Dangol (HND / First Semester)


Networking 2019

Access Point

An access point is a networking device which is used in wireless local area network to send
signals. In this network we have used access points to wirelessly connect laptops and tablets to our
network. We have connected access points on switches and through those access points users can
wirelessly join our network.

VPN Tunnel

We used VPN tunnel on VPN server to secure our data and block unauthorized users to connect in
our network. VPN tunnel encrypts our data while sending and decrypts our data while receiving
which decreases chances of data loss in our system.

Servers in use:
We have configured multiple servers on the server computer we bought after selecting. The servers
we configured are described below:

Domain Controller Server

Domain controller server is the main server of our system and this server is kept in our head office.
This server has the information of all our users in head office. This server responds to
authentication request made by our clients and gives them permissions. All users of our domain are
created in this server.

Domain Name System (DNS) Server

In this system DNS server is configured in the same server as Domain Controller server. A DNS
server translates domain name to IP address and IP address to domain name. Since we have
configured this in our main server we did were not required to buy additional server for DNS
server.

Dynamic Host Configuration Protocol (DHCP) server

In this system DHCP server provides IP address, Domain and gateway to clients head and branch
offices. This server is also kept in head offices and responds to requests of client who are
requesting for IP address.

DHCP Relay Agent

37 Meghant Dangol (HND / First Semester)


Networking 2019

In this system DHCP relay agent relays the request of clients from another network which is
branch offices. If user from branch office requests IP address then relay server relays the request to
DHCP server then it relays the response of DHCP server to clients.

Print Server

In this system we have used print server to manage printers and printing jobs. In head office this
server is configured in same server as Domain Controller and in branch office this server is
configured in same server as Child Domain Controller.

Windows Deployment Services (WDS) server

In this system we have used WDS server to install a client operating system in client computers.
This server is configured in same server as Domain Controller. First DHCP server provides IP to
new client computers then WDS server starts installing client operating system in our system.

Virtual Private Network (VPN) Server

In this system we have used VPN server to allow clients to access our network form a public
network. First the client computers should be connected in our system through public network then
this server provides IP to those clients. We have also used VPN tunnels in order to secure our
network from unauthorized users.

Read-only Domain Controller (RODC) Server

In this system we have used RODC server in branch offices to keep data backup of our domain
controller. RODC server only allows users of branch offices to see and check users of domain
controller but does not allow them to create a new user or modify a user.

Child Domain Controller (CDC) Server

In this system we have used CDC server in branch offices make a sub domain of our domain. CDC
acts as a Domain Controller and can create and modify its own users.

Testing of Network Design


S.N Test Predicted Output Actual Output

38 Meghant Dangol (HND / First Semester)


Networking 2019

1 DC Server Name of domain should be Name of our domain was shown in


shown in local server and local server of server manager and
administrator should be able to we were able to create users
create users

2 DNS server After typing name of domain in Nslookup gave name of our domain
nslookup it should give IP after typing IP address and it gave IP
address after typing name of our
address of that domain domain

3 DHCP server All clients in a network should Clients got IP addresses of the scope
get IP addresses we defined while configuring DHCP
server and address leashes were
shown in DHCP server

4 DHCP Relay Requests of clients in second Clients from another network got IP
Agent network should be relayed to address from the second scope we
DHCP server and clients in defined and address leashes were
another network should get IP shown in DHCP server
address.

5 WDS server Client operating system should Client operating system was
be deployed in client computers successfully installed in client
computers by logging in with a valid
username and password

6 Print server Printer should be displayed in After connecting to print server


control panel of client printers and printers, printers were
computers displayed in control panel of client
computers

7 RODC server All data of DC server should After logging in with a RODC
be displayed but users should account we were able to see all users
not be created or modified of our domain but we were not able
to create or modify users

8 CDC server A domain of Domain of branch office was created.


childDomain.MainDomain.com
should be created.

39 Meghant Dangol (HND / First Semester)


Networking 2019

9 VPN server User should be able to access a Users were able to connect to our
network from public network network after logging in with a valid
username and password

Evaluation of Network Design


In this network system computers in head offices are kept in mesh topology and computers in
branch topology are kept in star topology. The two server computer we selected are used in head
and branch offices respectively. Domain Controller is the main server which checks security
authentication of clients in our system. We have configured DNS server which convert domain
name into IP addresses and IP addresses to domain name in same server as Domain Controller to
make our network system cost effective. DHCP server provides IP address and IP of DNS server to
all clients in our network. DHCP Relay Agent relays requests of IP address from branch offices to
DHCP server located in head office then DHCP server provides them IP address of their network.
We have configured print server which manages printer and printing jobs in same server as
Domain Controller. We have also configures WDS server which installs client operating system in
client computers in same server as Domain Controller. We have connected branch office and head
office using VPN and both VPN servers in branch office and head office are connected wirelessly.
In branch office a RODC server keeps backup of data which is stored in main Domain Controller
and a CDC server acts as a sub domain in branch office. We have also configured print server in
CDC server at branch office which manages printers and printing jobs. Computers in branch office
are connected to DHCP Relay Agent using multiple switches in order to get IP addresses. A VPN
server is also kept in head office which allows users to connect into our network from public
network remotely, we have also set up VPN tunnel in VPN server in order to encrypt and decrypt
data going and coming from public network.

40 Meghant Dangol (HND / First Semester)


Networking 2019

Maintenance Schedule

Figure 17: Maintenance Schedule

Figure 18

41 Meghant Dangol (HND / First Semester)


Networking 2019

Justification of Maintenance Schedule


On first day of maintenance we first troubleshoot the network for problems. This will take around
three hours after troubleshooting the network we then take our lunch break for an hour. Then we
manage server and server operating system. After that we deploy some important updates and end
our first day. On second day of maintenance we first check for updates that were deployed on
previous day it will take around an hour. Then we upgrade and repair our computers in the
network. After that we take a short break then we check reports to determine how we can improve
our network system. After that we deploy some updates and that will end our second day and also
first phase of our maintenance. On third day as usual we will check for updates which were run on
previous day. We then apply some improvements in our system. Then we take a short break and
troubleshoot our network issues. After that we will deploy some important updates and that will
end our third day of maintenance. On our fourth day we will check for updates which were
deployed on previous day. Then we will attend a meeting with member of board to show them the
network functionality and talk will them about further improvements. After the meeting we will
take a break. Then will we check reports to determine the network’s functioning and run some tests
this will end our fourth day of maintenance. On the fifth day we will check if our network is
working properly or not. Then we will apply some improvements in the system and take a short
break. Then we will troubleshoot the network and deploy update of software this will end our fifth
day of maintenance.

P7

Domain Controller (DC) Servers


“A domain controller (DC) is a server that responds to security authentication requests within a
Windows Server domain.” (What is a Domain Controller? - Definition from Techopedia, n.d.).
Domain controller is a server which is used to manage the users of that domain. This server
provides a username and password to the users and network administrator can also mange log on
hours and log on to on this server.

Prerequisites for configuring Domain Controller


• Installed server operating system.
• Static IP address should be given to server.

Configuration of Domain Controller:


The following steps are required to be followed while configuring Domain Controller server:

42 Meghant Dangol (HND / First Semester)


Networking 2019

1. Open Server Manager go to


add roles and features

2. Read the guidelines for


installing features and click next

3. Select installation type and


click next

43 Meghant Dangol (HND / First Semester)


Networking 2019

4. Click on Active Directory


Domain Services (ADDS) and
click next

5. Select some other features


you want to install on server and
click next

6. Click on restart automatically


if required and then click install

7. After clicking install the


ADDS should start installing

44 Meghant Dangol (HND / First Semester)


Networking 2019

8. After the installation is


complete click close

9. Now on server manager click


on notification and click on
promote this server to domain
controller

10. Click on Add new forest and

45 Meghant Dangol (HND / First Semester)


Networking 2019

type domain name and click next

11. Type a secured password and


click next

12. Click Next as delegation


server cannot be created

46 Meghant Dangol (HND / First Semester)


Networking 2019

13. Verify NetBIOS name and


click next

14. Locate database folder and


click next

15. Review your selections and


if everything is correct click next

47 Meghant Dangol (HND / First Semester)


Networking 2019

16. Now that all prerequisite are


passed click install

17. The installation should begin


now

18. After the installation is


completed you will be signed
out and you need to enter the
password that you created while
creating domain controller

48 Meghant Dangol (HND / First Semester)


Networking 2019

After following all the steps mentioned above DC should be configured to check whether the
domain controller is installed correctly or not there is a simple way to evaluate it. For this open
server manager and click on local server. If the name of domain is in Domain. Then DC is
successfully configured.

Domain Name System (DNS) Server


“The Domain Name System (DNS) is the phonebook of the Internet. Humans access information
online through domain names, like nytimes.com or espn.com. Web browsers interact through
Internet Protocol (IP) addresses. DNS translates domain names to IP addresses so browsers can
load Internet resources” (What Is DNS? | How DNS Works | Cloudflare, n.d.). DNS is useful while
contacting the domain as memorizing IP addresses of servers is way harder than memorizing the
name of domain.
By using DNS clients computers can contact their domains by knowing the name of domain.

Prerequisites for configuring DNS server


• Server operating system should be installed on server.
• Server should have a static IP address.

Configuration of DNS server


The following steps are required to be followed while configuring DNS server:

1. First as usual go on server manager and then go to manage and then click on add roles and
features.

2. After that read the guidelines if you want to otherwise click next

49 Meghant Dangol (HND / First Semester)


Networking 2019

3. Select installation type and click next.

4. Click on DNS server and


click next

5. Select additional features


and click next and after that
click on restart server
automatically if required and
click install

6. Installation should begin


now so wait for installation
to complete

50 Meghant Dangol (HND / First Semester)


Networking 2019

7. After installation is
complete click on close

8. Now on server manager


click on tools and on tools
click DNS

9. After that DNS manager


should open now expand
your computer name and
click on forward lookup
zones

51 Meghant Dangol (HND / First Semester)


Networking 2019

10. Right click on forward


look up zone and click on
new zone. After that a
setup wizard should pop
up. Click on
primary zone and click
next

11. Click on to all servers


running on this domain
and click next

52 Meghant Dangol (HND / First Semester)


Networking 2019

12. Write name of your


domain in zone name and
click next

13. Click on allow only


secure dynamic updates
and click next

14. Now click on finish


and your DNS is ready
for forward lookup

53 Meghant Dangol (HND / First Semester)


Networking 2019

15. Now right click on


Reverse Lookup Zones
and
click on new zone

16. Click on primary zone


and click next

54 Meghant Dangol (HND / First Semester)


Networking 2019

17. Click on all servers


running on this domain and
click next

18. Click on IPv4 reverse


lookup zone and click next

55 Meghant Dangol (HND / First Semester)


Networking 2019

19. Insert your Network ID


and click next

20. Click on Allow only


secure dynamic updates and
click next

21. After that right click on


your network id and click on
New Pointer

56 Meghant Dangol (HND / First Semester)


Networking 2019

22. On new pointer insert host


IP address and browse for
host name and then click ok

After following all the steps mentioned above DNS server should be configured correctly to check
whether DNS server is correctly configured or not open DNS Manager and right click on your
computer name then click on launch nslookup. After nslookup opens type the domain name and
your IP address should be displayed and then type your IP address and your domain name should
be displayed.

Dynamic Host Configuration Protocol (DHCP) Server


“A DHCP Server is a network server that automatically provides and assigns IP addresses, default
gateways and other network parameters to client devices” (What is a DHCP Server? | Learn What
They Are & How They Work | Infoblox, n.d.). DHCP server is useful because if we have DHCP
server we do not statically need to provide IP addresses to clients as DHCP server automatically
provides IP addresses. This server completely reduces IP redundancy as it provides one IP to one
client at a time.

Prerequisites in configuring DHCP server


• Server operating system should be installed on server.
• Server should have static IP.

Configuration of DHCP Server


The following steps are required to be followed while configuring DHCP server.

57 Meghant Dangol (HND / First Semester)


Networking 2019

1. First as usual go on server manager and then go to manage and then click on add
roles and features.

2. After that read the guidelines if you want to otherwise click next 3. Select
installation type and click next.
4. Click on DHCP server and
click next

5. Select Additional features


and click next then click on
restart this server automatically
if required and click next

6. After that server should start


installing wait for feature to
install completely

58 Meghant Dangol (HND / First Semester)


Networking 2019

7. After the feature is installed


click close

8. Now click on tools and click


on DHCP

59 Meghant Dangol (HND / First Semester)


Networking 2019

9. After that DHCP should


open. Now expand your
computer name. Right click
IPv4 and click on new scope

10. After that a New Scope


Wizard should pop up. Now
name that scope and add
description if needed and click
next

11. Give start IP and end IP to


that scope and click next

60 Meghant Dangol (HND / First Semester)


Networking 2019

12. If you want to exclude some


IP addresses you can add it
otherwise click next

61 Meghant Dangol (HND / First Semester)


Networking 2019

13. Add leash duration and click


next

14. Add your router’s IP


address and click next

15. Give your parent domain


name and add your server’s
name and IP address then
click next

62 Meghant Dangol (HND / First Semester)


Networking 2019

16. Enter the IP address of


WINS server and click next.
If there is no WINS server
click next

63 Meghant Dangol (HND / First Semester)


Networking 2019

17. Click on Yes I want to


activate this scope and click
next

18. Now your scope should


be activated

After following all the steps mentioned above DHCP server should be configured correctly to
check whether DHCP server is correctly configured or not open client computer and connect it in
the same LAN as DHCP server. After the client computer opens check Address Leashes on DHCP.
If there is a computer in Address Leashes then DHCP is configured correctly.

DHCP Relay Agent


“DHCP relay agent is any TCP/IP host which is used to forward request and replies between
DHCP server and client when the server is present on the different network. Relay agents receive
DHCP messages and then generate a new DHCP message to send out on another interface” (DHCP
Relay Agent in Computer Network - GeeksforGeeks, n.d.). As DHCP server can only provide IP
addresses in one LAN DHCP relay agent is important for providing IP addresses in multiple
LANs.

64 Meghant Dangol (HND / First Semester)


Networking 2019

Prerequisites for configuring DHCP relay agent


• Server operating system should be installed on server.
• DHCP server with multiple scopes should be configured.
• DHCP server should have gateway.
• DHCP relay agent should be connected to all LANs which requires IP addresses.
• DHCP relay agent should have static IP Addresses for all LANs.

Configuration of DHCP relay agent


The following steps are required to be followed while configuring DHCP relay agent:

1. First as usual go on server manager and then go to manage and then click on add roles and
features.

2. After that read the guidelines if you want to otherwise click next

3. Select installation type and click next.

4. Click on Remote Access


and click next

5. If you want to know


about remote access the
read it otherwise click next

65 Meghant Dangol (HND / First Semester)


Networking 2019

6. Click on Routing and


click next

7. After reading Web


Server
Role click next

66 Meghant Dangol (HND / First Semester)


Networking 2019

8. Select Role Services and


click next

9. Click on restart server


automatically if required
and click Install

10. Wait for installation to


complete and after
installation is complete
click close

67 Meghant Dangol (HND / First Semester)


Networking 2019

11. Now on server


manager click on tools and
click on routing and
remote access

12. Right click on your


computer name and click
on configure and enable
routing and remoter access

68 Meghant Dangol (HND / First Semester)


Networking 2019

13. After that a setup


wizard should pop up now
click next

14. Now click on Custom


Configuration and
click next

15. Now click on LAN


routing and click next

69 Meghant Dangol (HND / First Semester)


Networking 2019

16. Click on finish

17. After that a click on


start service

70 Meghant Dangol (HND / First Semester)


Networking 2019

18. After the service has


started expand IPv4 and
click on New Routing
Protocol

19. Click on DHCP Relay


Agent and click ok

71 Meghant Dangol (HND / First Semester)


Networking 2019

20. After that click on New


Interface

21. Click on LAN other


than LAN on which DHCP
is connected to

72 Meghant Dangol (HND / First Semester)


Networking 2019

22. Check Host-count


threshold and Boot
threshold and click ok

23. Now Right click on


DHCP Relay Agent and
click on properties

73 Meghant Dangol (HND / First Semester)


Networking 2019

24. Add the IP of DHCP


server and click ok

After following all the steps mentioned above DHCP relay agent should be configured correctly to
check whether DHCP relay agent is correctly configured or not open client computer and connect
it in the LAN other than DHCP server. After the client computer opens check Address Leashes on
DHCP. If there is a computer in Address Leashes is on scope different than the LAN DHCP server
is connected to then DHCP relay agent is configured correctly.

Windows Deployment Services (WDS) Server


WDS is a server role provided by server operating system this feature allows a server to install a
windows operating system on a new client computer if client computer is connected to same LAN
as server.

Prerequisites for configuring WDS server


• Server operating system should be installed on server.
• Server should have ADDS installed.
• Server should have DNS installed.
• Server should have DHCP installed.
• A user which can connect to domain.

Configuration of WDS server


The following steps are required to be followed while configuring WDS server:

1. First as usual go on server manager and then go to manage and then click on add roles and
features.

74 Meghant Dangol (HND / First Semester)


Networking 2019

2. After that read the guidelines if you want to otherwise click next

3. Select installation type and click next.


4. Click on Windows
Deployment Services and click
next

5. Add additional features if


needed click next and if you
want to read about WDS read
and click next then on role
services click on Deployment
Server and click next

6. Click on restart this server


automatically if required and
click install

75 Meghant Dangol (HND / First Semester)


Networking 2019

7. Installation of WDS server


should begin now so wait for
installation to complete

8. After installation is complete


click on close

76 Meghant Dangol (HND / First Semester)


Networking 2019

9. Now on server manager click


on tools and click on Windows
Deployment Services

10. A setup wizard should pop


up. Now read the requirements
and click next

11. Click on Integrated with


Active Directory and click next

77 Meghant Dangol (HND / First Semester)


Networking 2019

12. Select Installation Path and


click next

13. Click both checkbox and


click next

78 Meghant Dangol (HND / First Semester)


Networking 2019

14. Click on respond to all client


computers and click next

15. WDS should be configured


now and click next

79 Meghant Dangol (HND / First Semester)


Networking 2019

16. Now expand your


computer name and Right click
on Install image and click on
Add Install
Image

17. Browse for your install.wim


file and click next

80 Meghant Dangol (HND / First Semester)


Networking 2019

18. Now select version of your


operating system and click next

19. Now the image should be


added to this server. Click finish

20. Now Right click on Boot


Image and click on Add Boot
Image

81 Meghant Dangol (HND / First Semester)


Networking 2019

21. Browse for your boot.wim


and click next

22. Write name and description


for your install image and click
next

82 Meghant Dangol (HND / First Semester)


Networking 2019

22. Check the selected images


and image files and click next

23. The
image
should be
added.
Now click
finish

24. Now
right click
on your
computer
name click
on All
Tasks and
click Start

83 Meghant Dangol (HND / First Semester)


Networking 2019

25. WDS
server
should be
configured
now

After following all the steps mentioned above WDS server should be configured correctly to check
whether WDS server is correctly configured or not power on a new client computer which is in
same LAN as WDS server. After it is powered on this server should provide an IP to client and
Windows Installation should begin. If the client computer wants to connect on your domain then
WDS server is configured successfully.

Print Server
“A computer in a network that controls one or more printers. The computer and its printers are
known as a print server” (print server Definition from PC Magazine Encyclopedia, n.d.). The main

84 Meghant Dangol (HND / First Semester)


Networking 2019

function of this server is to manage printers and printing jobs. This server take printing jobs from
clients and manages them in a sequence and sends those printing jobs to printer.

Prerequisites for configuring Print server


• Server operating system should be installed on server.
• Server should have ADDS installed.
• Server should have DHCP installed.
• A user which can connect to domain.

Configuration of Print server


The following steps are required to be followed while configuring Print server:

1. First as usual go on server manager and then go to manage and then click on add roles and
features.

2. After that read the guidelines if you want to otherwise click next

3. Select installation type and click next.

4. Click on Print and


Document
Services and click next

5. Add additional features if


required and If you want to
read about print and document
services read it and click next.
Then click Print Server and
click next

85 Meghant Dangol (HND / First Semester)


Networking 2019

6. Click on restart automatically


if required and click install

7. Now the installation of Print


server should begin so wait for
installation to complete

86 Meghant Dangol (HND / First Semester)


Networking 2019

8. After the installation is


complete click on close

9. Now on server manager


click on Print Management

87 Meghant Dangol (HND / First Semester)


Networking 2019

10. Now expand Print server


and right click on Printers and
click on add printer

11. Now click on create new


port and click next

12. Add your port and click on


install new driver and click next

88 Meghant Dangol (HND / First Semester)


Networking 2019

13. Select a Manufacturer and


select a printer and click next

14. Name that printer and click


next

89 Meghant Dangol (HND / First Semester)


Networking 2019

15. Print server should be


configured.

16. Now click Finish

17. The printer which was


added should be shown in
Printer
Name

90 Meghant Dangol (HND / First Semester)


Networking 2019

After following all the steps mentioned above Print server should be configured correctly to check
whether Print server is correctly configured or not power on a client computer which is on same
LAN as server. Now press windows+R type \\IP address of your server. The printer you added
should be visible there. Right click on printer and click connect. Enter usename and password to
connect to your domain. If the printer is connected you should get following results in devices and
printer in control panel.

Child Domain Controller (CDC) Server


CDC server is a new domain controller server added to the existing domain. They work under main
domain controller and is like a branch of main domain. CDC server have their own users and
computer under their domain and are able to create new users and computers.

Prerequisites for configuring CDC server


• Server operating system should be installed on server.
• Server should have ADDS installed.
• Server should be connected to main domain.

Configuration of CDC server


The following steps are required to be followed while configuring CDC server:

1. Click on
notifications and click
on Promote this
server to a domain

91 Meghant Dangol (HND / First Semester)


Networking 2019

controller

2. Now a
configuration wizard
should open. Click on
Add a new domain to
an existing forest.
Enter a new domain
name and change
user. Then click next

3. Enter a password
and click next

92 Meghant Dangol (HND / First Semester)


Networking 2019

4. Check credentials and click


next

5. Check NetBIOS domain


name and click next

93 Meghant Dangol (HND / First Semester)


Networking 2019

6. Check installation path and


click next

7. Review your options and


click next

8. If all prerequisite are

94 Meghant Dangol (HND / First Semester)


Networking 2019

checked click install

9. The installation for CDC


should begin now. So wait
for installation to complete

After following all the steps mentioned above you should be able to sign out and after you sign in
CDC server should be configured correctly to check whether CDC server is correctly configured or
not go to Tools and click on Active Directory Users and Computers. There add a new user. If the
user has username@childDomain.mainDomain.com then CDC is successfully configured.

Read-Only Domain Controller (RODC) Server


‘Read-Only domain controller (RODC) is a server that hosts an Active Directory database's read-
only partitions and responds to security authentication requests’ (What is RODC (read-only

95 Meghant Dangol (HND / First Semester)


Networking 2019

domain controller)? - Definition from WhatIs.com, n.d.). This server stores all data of users and
computers but is not able to create new users and computers.

Prerequisites for configuring RODC server


• Server operating system should be installed on server.
• Server should have ADDS installed.
• Server should be connected to main domain.
• Domain Controller should have a user on Read-Only Domain Controllers group.

Configuration of RODC server


The following steps are required to be followed while configuring RODC server:
1. On server manager click
on notification and click on
Promote this server to a
domain controller

2. On ADDS configuration
wizard click on Add a
domain controller to existing
domain and change user to
administrator and click next

3. Click on Read only domain

96 Meghant Dangol (HND / First Semester)


Networking 2019

controller and enter password.


Then click next

4. On delegated administrator
account select a user which is
added on Read-Only Domain
Controllers group and click
next

5. Select a server from which


you want to replicate data
and click next

6. Select installation folder

97 Meghant Dangol (HND / First Semester)


Networking 2019

and click next

7. Review your options and


click next

8. After all prerequisites are


checked click install and wait
for server to install.

98 Meghant Dangol (HND / First Semester)


Networking 2019

After following all the steps mentioned above you should be able to sign out and after you sign in
with a RODC account RODC server should be configured correctly to check whether RODC
server is correctly configured or not go to Tools and click on Active Directory Users and
Computers. There add a new user. If you get the following error message then RODC server is
successfully configured.

Virtual Private Network (VPN) server


“A virtual private network, or VPN, is an encrypted connection over the Internet from a device to a
network. The encrypted connection helps ensure that sensitive data is safely transmitted. It
prevents unauthorized people from eavesdropping on the traffic and allows the user to conduct
work remotely” (What Is a VPN? - Virtual Private Network - Cisco, n.d.). A VPN server is used by
large corporate offices to remotely connect to their servers.

Prerequisites for configuring VPN server


• Server operating system should be installed on server.
• Server should have ADDS installed.
• Server should be connected to public network.
• A user which can connect to domain.

Configuration of VPN server


The following steps are required to be followed while configuring VPN server:

1. First as usual go on server manager and then go to manage and then click on add roles and
features.

2. After that read the guidelines if you want to otherwise click next

3. Select installation type and click next.


4. On Server Roles click on
Remote Access and click
next

99 Meghant Dangol (HND / First Semester)


Networking 2019

5. Add additional features if


required and read about
remote access and click
next. Then on Role Services
click on DirectAccess or
VPN and click next

6. Read about Web Server


Role if you want to then
click next. Then add Role
services and click next.
Click on Restart server
automatically if required
and click install.

7. Installation should begin

100 Meghant Dangol (HND / First Semester)


Networking 2019

now so wait for installation


to complete

8. After installation
is complete click
close

9. Now on server manager


click on Tools and Routing
and Remote Access. On
Routing and Remote Access
click on your computer
name and click on
Configure and Enable
Routing and Remote
Access

101 Meghant Dangol (HND / First Semester)


Networking 2019

10. A setup wizard should


pop up now so click next

11. Click on Custom


configuration and click next

12. Click on VPN access


and click next

102 Meghant Dangol (HND / First Semester)


Networking 2019

13. Click Finish and click on


start service

14. Now Right click on your


computer name and click on
Properties

15. Click on IPv4 and Click


on static address pool. Click
on Add and add a static
address pool and click ok

103 Meghant Dangol (HND / First Semester)


Networking 2019

After following all the steps mentioned above VPN server should be configured correctly to check
whether VPN server is correctly configured or not power on client computer and connect it to your
workplace by VPN account. If VPN server is configured correctly then on Routing and Remote
access and on Remote access clients you should be able to see name of your client computer.

Analysis Documentation
1. Domain Controller
Test
Expected Output Actual Output
Name of our domain
should be shown on
local server in server
manager

Analysis: Administrator has the right to create users, group and organizations. It shows positive
results and configuration of DC server is successful

2. DNS Test
Expected Output Actual Output
In nslookup name of
domain should be
converted into IP
address and IP address
should be converted
into name of domain

Analysis: DNS server now converts name of domain into IP address and IP address into name of
domain. It shows positive results and configuration of DNS server is successful

104 Meghant Dangol (HND / First Semester)


Networking 2019

3. DHCP Test
Expected Output Actual Output
DHCP server should
provide IP addresses to
clients in a network

Analysis: DHCP server provided IP of the scope we defined which shows positive results and
configuration of DHCP server is successful

4. DHCP Relay Agent


Test
Expected Output Actual Output
DHCP relay agent
should relay request of
client to DHCP server
and client from
another network
should get IP address

Analysis: DHCP Relay agent relayed request of client to DHCP server and client got IP address
which shows positive results and configuration of DHCP Relay Agent is successful

105 Meghant Dangol (HND / First Semester)


Networking 2019

5. Print Server Test


Expected Output Actual Output
Printer should be
displayed in control
panel of client after
connecting it to print
server

Analysis: Printer was shown in control panel of client which shows positive results and
configuration of print server is successful

6. WDS Test
Expected Output Actual Output
Client operating
system should be
installed in client
computers

106 Meghant Dangol (HND / First Semester)


Networking 2019

Analysis: Client computer asked for a username and password to connect to WDS server which
shows positive results and configuration of WDS server is successful

7. RODC Test
Expected Output Actual Output
Data of main domain
should be visible on
RODC server but it
should not be able to
create and modify
users

Analysis: Data of n controller was replicated in RODC server but it was not allowed to
domai create
a user which shows tive results and configuration of RODC is successful
posi

8. CDC Test
Expected Output Acutal Output

107 Meghant Dangol (HND / First Semester)


Networking 2019

A child domain should


be created under the
name of main domain
and it should be able to
create users under its
name

Analysis: A child domain was created and user under name of child domain was also created
which shows positive results and configuration of CDC was successful

9. VPN Test
Expected Output Actual Output
Users from public
network should be able
to connect in the
network with valid
username and password

Analysis: Users were able to connect in our network by using a valid username and password and
connected user were shown in Remote Access Clients in Routing and Remote Access which
shows positive results and configuration of VPN server was successful

108 Meghant Dangol (HND / First Semester)


Networking 2019

Enhancement Recommendation for Network System


In order to further improve our network system we have thought of various enhancement. Some of
enhancements are for security, some are for cost effectiveness and some are quality of life
enhancements. We could add some firewalls while connecting to branch offices by doing this we
can share information with branch offices more securely. We could also configure DHCP and
DHCP Relay server on same server as Domain Controller which would save us a lot of capital
which could be used on various other improvements. VPN server could also be configured on same
server as Domain Controller server. We could also add Host Based Intrusion Detection System
(HIDS) on client computers which would further prevent unauthorized access from joining our
system. We could use latest version of firewalls, other software and firmware to boost our system.
We could give our employees some information on our network so that they can fix small
problems and error themselves which would save us some cost for maintenance. We could use
network monitoring tools to regularly check for our network performance. We could divide our
network in more subnets and decrease IP loss in our system. We could use various traffic shaping
techniques to optimize our network traffic.
We could use cloud servers to store non-important data which would be cost effective.

Other than these enhancements we could use newest networking cables for faster transmission of
data. We could also upgrade client computers. We could manage our bandwidth as well. We could
have also used a wireless connection while connecting head office and branch office. We could
have used repeaters to regenerate and amplify our weak signals.

Evaluation of Network System


Before setting up this network system we had designed the network diagram and had a meeting to
show report to our client. Once our client gave us their feedback we started on building this
system. First we contacted an ISP to setup an Internet connection. We then kept a firewall between
internet and our router. We then started configuring servers located in head office. We provided
them IP address with subnet mask of 255.255.255.248 we sub netted the network in order to
decrease loss of IP address. We the configured the server on head offices. After configuring these
servers we tested them and connected them in mesh topology. Now it was time to configure our
client computers. We installed client operating system in client computers by using WDS server
and connected them to our main domain. After configuring all server and clients in head office we

109 Meghant Dangol (HND / First Semester)


Networking 2019

began configuration on branch office. We used wires to connect head office and branch office we
then installed server operating system in server computers of branch office after server computers
we configured client computers in branch office.

This system at Landmark IT Pvt. Ltd is designed to give networking services to different types of
organization like School, Bank, Colleges, INGO, NGO etc. With domain controllers we were able
to manage this system properly. DHCP server also provided IP addresses to its clients. With our
VPN servers many users were able to remotely connect in our network. DNS sever was able to
convert domain name into IP address and IP address to domain name. Print server was able to
manage all printers and printing jobs. WDS server successfully deployed operating system on
client computers. RODC server replicated the data of main Domain Controller and CDC server
created a sub domain. By configuring these servers we could save time and effort of our
employees. Now Landmark IT Pvt. Ltd will be able to provide its services to many schools, banks,
colleges, INGOs and NGOs.

Even though a lot of enhancements can be done in this system. This system is working properly
and efficiently. We would be adding some enhancements to this system while maintaining it. Even
though this system lacks some of the advanced features like cloud computing, Virtual Networking
etc. This system is suitable for present day world.

References
Beal, V. (n.d.). What is a Terminal Server? Webopedia Definition. Retrieved from webopedia:
https://www.webopedia.com/TERM/T/terminal_server.html

DHCP Relay Agent in Computer Network - GeeksforGeeks. (n.d.). Retrieved from geeksforgeeks.:
https://www.geeksforgeeks.org/dhcp-relay-agent-in-computer-network/

File server. (2019, 09 18). Retrieved from ionos:


https://www.ionos.com/digitalguide/server/knowhow/file-server/

https://www.javatpoint.com/osi-model. (n.d.). Retrieved from javatpoint:


https://www.javatpoint.com/osi-model

Hybrid Topology in Computer Network | Working concept of Hybrid Topology | Advantage. (n.d.).
Retrieved from generalnote.com: http://generalnote.com/Computer-Network/Computer-

110 Meghant Dangol (HND / First Semester)


Networking 2019

Network-topologies/Hybrid-Topology.php

Introduction of Firewall in Computer Network - GeeksforGeeks. (n.d.). Retrieved from


geeksforgeeks: https://www.geeksforgeeks.org/introduction-of-firewall-in-computer-
network/

print server Definition from PC Magazine Encyclopedia. (n.d.). Retrieved from pcmag:
https://www.pcmag.com/encyclopedia/term/49686/print-server

Rouse, M. (n.d.). What is a Web server? Retrieved from WhatIs:


https://whatis.techtarget.com/definition/Web-server

What is a Server ? (n.d.). Retrieved from computerhope:


https://www.computerhope.com/jargon/s/server.htm

What is a DHCP Server? | Learn What They Are & How They Work | Infoblox. (n.d.). Retrieved
from Infoblox: https://www.infoblox.com/glossary/dhcp-server/

What is a Domain Controller? - Definition from Techopedia. (n.d.). Retrieved from techopedia:
https://www.techopedia.com/definition/4193/domain-controller-dc

What Is a VPN? - Virtual Private Network - Cisco. (n.d.). Retrieved from cisco:
https://www.cisco.com/c/en/us/products/security/vpn-endpoint-security-clients/what-is-vpn

What Is DNS? | How DNS Works | Cloudflare. (n.d.). Retrieved from cloudflare:
https://www.cloudflare.com/learning/dns/what-is-dns/

What is Host-Based Intrusion Detection System (HIDS)? - Definition from Techopedia. (n.d.).
Retrieved from techopedia: https://www.techopedia.com/definition/12826/host-
basedintrusion-detection-system-hids

What is RODC (read-only domain controller)? - Definition from WhatIs.com. (n.d.). Retrieved
from techtarget: https://searchwindowsserver.techtarget.com/definition/RODC-read-only-
domaincontroll

What is Server Software? - Definition from Techopedia. (n.d.). Retrieved from techopedia:
https://www.techopedia.com/definition/23735/server-software

111 Meghant Dangol (HND / First Semester)


Networking 2019

112 Meghant Dangol (HND / First Semester)

You might also like